Please turn on your JavaScript for this page to function normally.
A closer look at Elcomsoft Advanced Office Password Breaker 3 Enterprise Edition

Elcomsoft Advanced Office Password Breaker breaks passwords and unlocks password-protected MS Word documents and Excel spreadsheets instead of attacking and recovering complex …

Firewire-based physical security attacks on Windows 7, EFS and BitLocker

This paper discusses Firewire-based physical security attacks on Microsoft Windows 7. In the course of his research, the author was successfully able to bypass the Windows 7 …

Securing virtualized environments

IT departments are under immense pressure to deliver more functionality and capacity at a time when budgets are shrinking and costs are increasing. Mounting expenses from …

Malware beyond Vista and XP

Windows may be ubiquitous, but there’s a thriving variety of alternative operating systems for enterprise and home use. However, the alternatives aren’t as risk …

Q&A: Dasient and current threats

Ameet Ranadive is a co-founder of Dasient, an Internet security company that protects websites from web-based malware attacks. In this interview he introduces his team at …

Security considerations for ISPs complying with the European Union Data Retention Directive

Back in April of this year the UK Home Office announced that all ISPs must retain their internet-related communication data for law enforcement authorities (LEAs) to gain …

A closer look at GFI LANguard 9

GFI LANguard is a network security scanner. It performs vulnerability assessments, identifies all possible security threats and provides the tools to remediate vulnerabilities …

5 tips to stop staff snooping

In a recent Cyber-Ark survey into “The recession and its effects on work ethics” carried out amongst 250 office workers in London’s busy Canary Wharf, a …

Holiday tips for laptop security

Summer is the time when most countries have the longest vacation periods. Regardless of whether the holiday is spent indoors or outdoors, at home or overseas, most people …

VPN market choices: Aligning network planning to enterprises’ security and mobility requirements

Virtual Private Networks (VPNs) are an essential part of enterprises’ IT security policies. Unfortunately, with the variety of mobile device applications, empowering …

Safety in the cloud(s): ‘Vaporizing’ the Web application firewall to secure cloud computing

Cloud computing was not designed for security, although organizations such as Cloud Security Alliance (CSA) and Open Web Application Security Project (OWASP) are making great …

A closer look at Nero BackItUp & Burn

Nero BackItUp & Burn lets you back up files to your hard drive or to online storage, schedule automatic backups, burn music, videos, photos, and data to CDs, DVDs, and …

Don't miss

Cybersecurity news